Cyber Security Budgets Are Misspent

A leading cyber security services company, Integrity360, has announced its findings from a Twitter poll to gain visibility into cyber security budgets and over surplus solutions within businesses. Their conclusion is that almost 30% of polled businesses have between 31-40 tools that are not required in their tech stack  

The poll, which was conducted between 8-10 March, found that over 30% of businesses believe that 30% of their budget is being allocated to tools and solutions that are not being used to their full potential.  

In addition, almost 30% of those surveyed agree that they have more than 31-40 tools and solutions within their tech stack that could be removed due to overlapping and unused features. This is a worrying figure when cyber security breaches continue to rise, and businesses are left with gaps that could give cyber attackers a route in. 

The CTO of Integrity360, Richard Ford, commented: “Whilst businesses recognise the need to allocate more budget towards cyber security, the difficulty lies in knowing where to apportion the spend...  It’s easy to throw money at all the shiny new tech and solutions on the market, but this results in disparate systems, with too many tools deployed for specific purposes, that ultimately go unmanaged and underutilised.” 

Furthermore, 46% of polled respondents believe the most damaging impact of a cyber security breach to be the consequential financial damage.

“Businesses need a cyber security strategy that provides full visibility over their tech stack and the solutions they have, those they need and those they can do without... An overabundance of solutions with features that overlap or aren’t required, is an accident waiting to happen, and a drain on budget and efficiency”, Ford commented. 

At a time of economic downturn when cyber security budgets are tight and risks are heightened, spending money on unnecessary and unused solutions is a business risk. Action to get rid of outdated systems, to consolidate different platforms and convergence of technologies us the best way optimise spending as well as improving overall security posture, according to Ford. 

 

You Might Also Read: 

Many Cyber Security Experts Don’t Understand The Systems They Are Trying To Secure:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« World Backup Day 
Bitbucket Backup Methods »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

Skybox Security

Skybox Security

Skybox combines firewall and network device data with vulnerability and threat intelligence, putting security decisions in your unique network context.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Mocana

Mocana

Mocana provides a software platform that allows you to develop, test and distribute more secure IoT devices and services.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

North East Business Resilience Centre (NEBRC)

North East Business Resilience Centre (NEBRC)

The North East Business Resilience Centre is a non-profit organisation here to support businesses in the North East of England in protecting themselves from cyber crimes and fraud.

RecoLabs (Reco)

RecoLabs (Reco)

Reco empowers organizations to discover their SaaS applications, identities, and data, control access and prevent the risk of exposure.

BCyber

BCyber

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

Epic Machines

Epic Machines

Epic Machines is a Value Added Reseller and Managed Security Services provider offering Security Transformation using Cloud-native solutions to commercial and government markets.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.